Linux might be known for its rock-solid securityâbut even the strongest walls can have cracks.
Security researchers have just revealed two critical vulnerabilitiesâCVE-2025-6018 and CVE-2025-6019âthat, when chained together, could allow any regular user to gain full root access on many major Linux distributions. Yes, you read that right: full control, zero admin credentials required.
Hereâs the kicker: these arenât obscure bugs buried deep in fringe packages. These vulnerabilities affect udisks (shipped by default in most desktop distros) and PAM (Pluggable Authentication Modules) configurations in SUSE Linux environments. Together, they create the perfect storm.
đ The Root of the Problem
Letâs break this down.
đš CVE-2025-6019 affects libblockdev and udisks, tools commonly used to manage storage devices. The flaw allows regular users to run commands with elevated privileges through a graphical interfaceâor even remotely through SSH, with a bit of creativity.
đš CVE-2025-6018, on the other hand, targets SUSEâs PAM configurations. It allows for improper authentication handling, opening the door to privilege escalation.
On their own, theyâre dangerous. But chained together? They create a backdoor that any local attacker could walk right throughâand right into root.
Security firm Qualys, which discovered the bugs, confirmed that proof-of-concept (PoC) exploits worked on Ubuntu, Fedora, Debian, and openSUSEâa pretty broad swath of the Linux ecosystem.
â ď¸ What You Should Do Immediately
If youâre running Linuxâespecially on desktops or multi-user environmentsâthis is your wake-up call.
â
Patch now. Vendors are rolling out updates. If yours hasnât yet, check back daily.
â
Update Polkit policies. As a temporary fix, require administrative authentication for all local actions.
â
Review your PAM and udisks usage. Donât assume defaults are safeâthey arenât.
đ§ But Why Does This Matter?
Because itâs not just about root accessâitâs about trust. These flaws show that even widely used, open-source components weâve relied on for years can still hide dangerous surprises.
Itâs also a reminder: security hygiene isnât optionalâeven on systems you think are safe by default.
Read Every Newsletter on Pingbrief đ
Interested in partnering with us and connecting with an audience of 10,000+ subscribers excited and curious about Tech & Business?
Feel free to reach out to us: [email protected]


